To listen to the headlines, the threats we face today are so sophisticated and intense, they can only be evaded with the help of artificial intelligence and machine learning. Losing sleep over zero-day cyber APTs launched by nation states? You shouldn’t be. It’s much more likely to be a common password or an off-the-shelf web app attack that …

The use of wartime analogies in cybersecurity is common in our industry. Sun Tzu is often quoted in presentations and papers to emphasize an author’s key point. I will spare you that in this article; however, I would like to introduce the idea of applying a rigorous framework derived from kinetic warfare to the cyber realm. The notion of …

The technology industry has always had a big problem with hype, with marketing teams, analysts and the media alike tending to fixate on the next big thing that will revolutionise our lives. Artificial intelligence is the latest technology to be seized by hype, due in part to its role as a staple of science fiction for decades – something …

The question of whether regular people need end-to-end encryption will surely be debated for quite some time. But for Alan Duric, CEO and co-founder of Wire, the question can only have a positive answer. Alan Duric on stage at FSec 2017 As he told the audience at the FSec security symposium in Varazdin, Croatia, end-to-end encryption is about …

What's New

Here’s the latest good reason for users to block JavaScript: if you don’t, your computer’s CPU power could be used to mine cryptocurrency without your knowledge or consent. Cryptocurrency mining in the browser The option to …

A Trojan that has previously been only stealing users’ banking credentials has been modified to do much more than that. This new variant, dubbed XPCTRA, can also steal users credentials for bitcoin cryptocurrency wallet Blockchain.info, …

Three out of every four DDoS attacks employed blended, multi-vector approaches in the second quarter of 2017, according to Nexusguard. Distribution of DDoS attack vectors The quarterly report, which measured more than 8,300 attacks, demonstrated …

Apple macOS High Sierra is now available as a free update from the Mac App Store, and it supports all Macs introduced in late 2009 or later. Apple File System (APFS) APFS is a new, advanced storage architecture providing an extensible foundation …

To listen to the headlines, the threats we face today are so sophisticated and intense, they can only be evaded with the help of artificial intelligence and machine learning. Losing sleep over zero-day cyber APTs launched by nation states? You …

Malware news

A Trojan that has previously been only stealing users’ banking credentials has been modified to do much more than that. This new variant, dubbed XPCTRA, can also steal users credentials for bitcoin cryptocurrency wallet Blockchain.info, …

Black Hat USA 2017

Fifty-nine percent of respondents to a Bitglass survey at Black Hat USA 2017 identified phishing as the best data exfiltration strategy, as human error and ignorance will always be exploitable. Understandably, and in line with recent …